1. Safe-keeping digital evidence with secure logging protocols: State of the art and challenges;Accorsi,2009
2. On the exploitation of process mining for security audits: the conformance checking case;Accorsi,2012
3. Context-aware trace alignment with automated planning;Acitelli,2022
4. Cost-based fitness in conformance checking;Adriansyah,2011
5. The drivers of cyber risk;Aldasoro;J. Financial Stab.,2022